Gift of Fire:
Social, Legal, and Ethical Issues for Computing and the Internet (Third edition) by Sara Baase
Slides
Slides for Chapter 1
Slides for Chapter 2
Slides for Chapter 3
Slides for Chapter 4
Slides for Chapter 5
Slides for Chapter 6
Slides for Chapter 7
Slides for Chapter 8
Slides for Chapter 9
Slides for Chapter 10
Assignment:
- What is the main provision of the Communications Assistance for Law Enforcement Act (CALEA)?
- What is one capability requested by the FBI as a requirement for telecommunications systems?
- What is the main provision or significance of the Electronic Communications Privacy Act of 1986?
- What was one thing the government agents did in the Steve Jackson Games case that was illegal?
- What issue about communications privacy was raised by the raid on Steve Jackson Games?
- What aspect of public key cryptography makes it especially useful for electronic commerce on the Internet?
- Many database problems involve the misidentification of people. Give two sources of such problems not related to computer technology.
- What are two important points or principles for designing user interfaces in safety-critical applications? In order to keep illegal immigrants and foreign visitors from working in the U.S., the government experimented with a program to require that every job applicant be checked against a national database (of people who can legally work in the U.S.) before being hired.
- What are some likely problems with this database? Mention an example of another database to support your arguments.(Responses should include issues from both Chapters 2 and 4.)
- Describe two underlying causes of the baggage-handling system problems that delayed the opening of the Denver Airport.
- Describe one practice or action (other than insufficient testing) that can introduce serious reliability or safety problems in software development. Give an example (of a real case).
- Explain one of the flaws in the Therac-25 system.
0 Comments